General

  • Target

    JaffaCakes118_c01e0d3c62816e4e70654584f2453897

  • Size

    4.6MB

  • Sample

    250105-129gkaxngw

  • MD5

    c01e0d3c62816e4e70654584f2453897

  • SHA1

    d4fecca8659fd80855ccbcfdfddb18ec8cf07ee6

  • SHA256

    ec8016a5990bf3b99560f987e4c21956d070f74235663df450c7dcbc6c1785ff

  • SHA512

    9a67b43dd2dd11405b96ea44beaf62a4b7403fd4d6ebaf3925a2510551c79c99c6286a186e5423c6efd3aa2ecfafd9f466090b772b40d49b313ee0f26d95898a

  • SSDEEP

    98304:wLAx7rdvBSmJJguJRtiP0OwFHoIdRnpcjLkQQXHa7TKHQvaWA5uh/ZUO+e:1rdFJgurgP0poIxcfeq3KHQCWA8RR

Malware Config

Extracted

Family

redline

Botnet

lyapota02

C2

190.2.136.29:3279

Attributes
  • auth_value

    c3619bd2b5611a61169719e72acd942d

Targets

    • Target

      JaffaCakes118_c01e0d3c62816e4e70654584f2453897

    • Size

      4.6MB

    • MD5

      c01e0d3c62816e4e70654584f2453897

    • SHA1

      d4fecca8659fd80855ccbcfdfddb18ec8cf07ee6

    • SHA256

      ec8016a5990bf3b99560f987e4c21956d070f74235663df450c7dcbc6c1785ff

    • SHA512

      9a67b43dd2dd11405b96ea44beaf62a4b7403fd4d6ebaf3925a2510551c79c99c6286a186e5423c6efd3aa2ecfafd9f466090b772b40d49b313ee0f26d95898a

    • SSDEEP

      98304:wLAx7rdvBSmJJguJRtiP0OwFHoIdRnpcjLkQQXHa7TKHQvaWA5uh/ZUO+e:1rdFJgurgP0poIxcfeq3KHQCWA8RR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks